Mainframes - The Past Will Come Back to Haunt You
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the hidden world of mainframe security in this Black Hat USA 2013 conference talk. Delve into the often-overlooked realm of mainframe systems that power critical infrastructure across governments, military, airlines, and banks. Uncover the security implications of these powerful machines, addressing the knowledge gap between IT security professionals and mainframe experts. Learn about mainframe security implementation, including configuration file locations, access methods, networking commands, and file structures. Gain insights into TSO, JCL, REXX, and other mainframe-specific technologies. Discover how to navigate the mainframe environment, understand resource access control, and explore potential vulnerabilities. Examine topics such as password hashes, FTP servers, and low-level capabilities. Investigate tools and techniques for mainframe security testing, including Nessus and Metasploit. Consider the implications of running Linux on mainframes and methods for searching sensitive data. Bridge the gap between modern IT security practices and the enduring world of mainframe computing in this comprehensive exploration of a often-misunderstood technology landscape.
Syllabus
Disclaimer
Mainframe Legacy
Phil Her
The Big Thing
IBM Matrix
TSO
Executors Care
Interactive System
Datasets
The Next Life
Unit Environment
JCL
REX
Master Console
FTP Server
Bash Script
JCL File
Resource Access Control
Password hashes
Binary
Algorithm
Low Level Cap
I Series Testing
Nessus
The Devil
Another World Alone
psychotic
NCR
iPad Pastures
Not an Idea
Surfactant
Password sniffing
Andersonin
One Count
MTP
Secret Tool
FTP
Java
I am
MainTV
interpreterlife
Mainframe at Home
Hercules
System
Internet Census
Metasploit
Linux on mainframes
Searching for sensitive data
Conclusion
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube